Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
31-05-2021 04:01
Static task
static1
Behavioral task
behavioral1
Sample
FC1A502103DBFF4E6054210D55FA670F.exe
Resource
win7v20210410
danabotgluptebametasploitplugxraccoonredlinesmokeloader330_5_ruz50f8ded12c46443e43915127b1219ac2fc439bb65339a5db91bba8fa758672b05e7eb691a224bf94servjasonbackdoorbankerdiscoverydropperinfostealerloaderpersistencespywarestealertrojanupxvmprotect
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
FC1A502103DBFF4E6054210D55FA670F.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
FC1A502103DBFF4E6054210D55FA670F.exe
-
Size
8KB
-
MD5
fc1a502103dbff4e6054210d55fa670f
-
SHA1
2e710dc3374c329f20d52efd119338adbda27b53
-
SHA256
418c5fa990720936d23f83e5bd72b11d4bbf045b33e60efe09e28aa074eac424
-
SHA512
a0c6a5512ec43699ac58383fe10ef4c3deac3038bc626837ea63aef2a2f9cfe9bff65419b51e484fe4d83f8dbc460fcd1558c322ae7d909a0518069d3d64ae91
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 3728 WerFault.exe 48 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe 3364 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3728 FC1A502103DBFF4E6054210D55FA670F.exe Token: SeDebugPrivilege 3364 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FC1A502103DBFF4E6054210D55FA670F.exe"C:\Users\Admin\AppData\Local\Temp\FC1A502103DBFF4E6054210D55FA670F.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3728 -s 13082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-